Suspected Security Breach?

Sign up for our Red Team Fundamentals Training Course

13 Jun 2017

Take your defensive strategies to the next level by understanding the mindset of an attacker and the methodologies they use.

Context has an established reputation for our technical training courses amongst our clients; we are now offering individuals the opportunity to sign up to our Red Team fundamentals training course in London offices 20th July 2017.

This course has been designed to teach the methods and approaches taken by real-world attackers when compromising an entire organisation. It is intended for security personnel, penetration testers, CISOs and incident responders looking to gain an insight into how a targeted attack could be conducted against your organisation and the tools and methodology that an attacker would use.

Topics covered on the course include:

Red teams explained

The security landscape

The Kill Chain

Attackers and agendas

Threat intelligence

Open source intelligence sources

Social engineering

Planting malware

Evasion and exfiltration

Prime targets

Building on Context's experience in running large scale red-team and CBEST engagements this course aims to teach the methods and approaches taken by real-world attackers when compromising an entire organisation, this course is as close to a real-world hacking attack as it gets.

This course is an introduction to our Red Teaming Courses, there are 2 additional advanced and expert courses: Practical Stealthy Post-Exploitation and Practical Red Team hacking that can be taken in addition to this one.